General

  • Target

    1125_56873981.doc

  • Size

    368KB

  • Sample

    201125-c1eg89cdqx

  • MD5

    bdba9e0cbaa81843d8a651ed0098a9fd

  • SHA1

    a105d9e6bb732093237bc2d555478c9a8a54bb6d

  • SHA256

    827866089f958b9df535168bc3efed843ee0d769cbe015758d90f9199f7b0d25

  • SHA512

    327076632a9dbfdfab0f0888a173f71cea1840d7ffa1e5afb825d60af794868db04269f1bfd88055c83bfaccc02ecf2868470bc01e559ab671a85830da4db6ee

Score
10/10

Malware Config

Targets

    • Target

      1125_56873981.doc

    • Size

      368KB

    • MD5

      bdba9e0cbaa81843d8a651ed0098a9fd

    • SHA1

      a105d9e6bb732093237bc2d555478c9a8a54bb6d

    • SHA256

      827866089f958b9df535168bc3efed843ee0d769cbe015758d90f9199f7b0d25

    • SHA512

      327076632a9dbfdfab0f0888a173f71cea1840d7ffa1e5afb825d60af794868db04269f1bfd88055c83bfaccc02ecf2868470bc01e559ab671a85830da4db6ee

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blacklisted process makes network request

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks